{"id":3760,"date":"2021-11-12T11:37:00","date_gmt":"2021-11-12T16:37:00","guid":{"rendered":"https:\/\/knowledgeflow.org\/the-knowledgeflow-newsletter-edition-5-2\/"},"modified":"2024-07-30T10:43:48","modified_gmt":"2024-07-30T14:43:48","slug":"the-knowledgeflow-newsletter-edition-5-updates","status":"publish","type":"post","link":"https:\/\/knowledgeflow.org\/es\/the-knowledgeflow-newsletter-edition-5-updates\/","title":{"rendered":"Bolet\u00edn de KnowledgeFlow - 5\u00aa edici\u00f3n: Novedades y perspectivas"},"content":{"rendered":"\n<h6 class=\"wp-block-heading\">Checkout our new newsletter packed with, hand-picked headlines from KnowledgeFlow&#8217;s dedicated cybersafety curators. Vol. 5. <\/h6>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Top Story<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><meta charset=\"utf-8\">GLOBAL NEWS: TTC Cyberattack May Have Stolen Information from Up to 25K Employees, Former Employees<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/globalnews.ca\/news\/8358094\/ttc-cyber-attack-investigation-employee-information\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-41.png\" alt=\"\" class=\"wp-image-3707\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-41.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-41-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-41-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-normal-font-size\"><meta charset=\"utf-8\">The TTC is now saying that the ransomware attack that occurred two weeks ago may have resulted in the loss of the personal information of up to 25,000 employees. This information may include names, addresses, and social insurance numbers.  Those who may have been affected will have credit monitoring and identity theft protection provided by the agency.<\/p>\n\n\n\n<p><a href=\"https:\/\/globalnews.ca\/news\/8358094\/ttc-cyber-attack-investigation-employee-information\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Cybersecurity<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">DIGITAL JOURNAL: Different Type of Business Stocktaking: Time for a Cybersecurity Check-Up?<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.digitaljournal.com\/business\/different-type-of-business-stocktaking-time-for-a-cybersecurity-check-up\/article\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-14.png\" alt=\"\" class=\"wp-image-3709\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-14.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-14-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-14-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-normal-font-size\">Cyberattacks continue to affect businesses in a multitude of ways. According to cybersecurity expert Josh Rickard, it is important for businesses to re-assess their cybersecurity systems periodically. This is true especially in the context of 2021, which has seen numerous cyberattacks, including ransomware.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.digitaljournal.com\/business\/different-type-of-business-stocktaking-time-for-a-cybersecurity-check-up\/article\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Online Security<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">FORBES: &#8220;Password&#8221; Isn&#8217;t a Password, and Other Cybersecurity Mistakes<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full is-style-default\"><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2021\/11\/12\/password-isnt-a-password-and-other-cybersecurity-mistakes\/?sh=16aa4fd8307d\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-15.png\" alt=\"\" class=\"wp-image-3710\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-15.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-15-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-15-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-normal-font-size\">Often, security breaches are caused by simple failures. There are cases of complex software attacks, but even those attacks depend on someone making simple mistakes at some point. To avoid security breaches and prevent cyberattacks, some simple solutions exist: multi-factor authentication, restricting administrative privileges, and updating systems, for example.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.forbes.com\/sites\/forbestechcouncil\/2021\/11\/12\/password-isnt-a-password-and-other-cybersecurity-mistakes\/?sh=16aa4fd8307d\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Careers<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">SECURITY INTELLIGENCE: Non-Traditional Cybersecurity Career Paths: How to Find Your Own Way<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/securityintelligence.com\/articles\/find-cybersecurity-career-paths-your-way\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-16.png\" alt=\"\" class=\"wp-image-3713\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-16.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-16-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-16-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p>Cybersecurity professionals find their way into the industry through a number of unique, non-traditional ways. This article examines the myriad ways that you could potentially become a cybersecurity expert yourself!<\/p>\n\n\n\n<p><a href=\"https:\/\/securityintelligence.com\/articles\/find-cybersecurity-career-paths-your-way\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Education<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">WASHINGTON POST: Senators Want a Surge in Cyber Help for Schools<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.washingtonpost.com\/politics\/2021\/11\/12\/senators-want-surge-cyber-help-schools\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-17.png\" alt=\"\" class=\"wp-image-3714\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-17.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-17-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-17-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p>A group of senators argue that the United States Education Department is not keeping up with the increase in K-12 cyberattacks that has happened over the past few years. Schools have been the victims of ransomware attacks more recently, but the Education Department&#8217;s main planning documents for school threats are old and deal mostly with physical security.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.washingtonpost.com\/politics\/2021\/11\/12\/senators-want-surge-cyber-help-schools\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Technology<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><meta charset=\"utf-8\">ROBINHOOD: Robinhood Announces Data Security Incident<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/blog.robinhood.com\/2021\/11\/8\/data-security-incident\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-39.png\" alt=\"\" class=\"wp-image-3715\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-39.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-39-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-39-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p><meta charset=\"utf-8\">Robinhood, the stock trading and investing app, announces that they experienced a data security incident November 3. Apparently, an unauthrozed third party obtained access to a limited amount of personal information for a portion of their customers. Robinhood believes that no social security numbers, bank account numbers, or debit card numbers were exposed; however, email addresses of 5 million people and other personal information has been taken.<\/p>\n\n\n\n<p><a href=\"https:\/\/blog.robinhood.com\/2021\/11\/8\/data-security-incident\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n<style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id3760_644b91-08{margin-bottom:var(--global-kb-spacing-xl, 4rem);}.kb-row-layout-id3760_644b91-08 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id3760_644b91-08 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id3760_644b91-08 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var(--global-kb-spacing-xxl, 5rem);padding-bottom:var(--global-kb-spacing-xxl, 5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id3760_644b91-08 > .kt-row-layout-overlay{opacity:0.50;background-color:var(--global-palette9, #ffffff);}@media all and (max-width: 1024px){.kb-row-layout-id3760_644b91-08 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id3760_644b91-08 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id3760_644b91-08 alignfull has-theme-palette7-background-color kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-layout-overlay kt-row-overlay-normal\"><\/div><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kb-theme-content-width\">\n<style>.kadence-column3760_8f8f06-89 > .kt-inside-inner-col{display:flex;}.kadence-column3760_8f8f06-89 > .kt-inside-inner-col{padding-bottom:0px;}.kadence-column3760_8f8f06-89 > .kt-inside-inner-col,.kadence-column3760_8f8f06-89 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column3760_8f8f06-89 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column3760_8f8f06-89 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column3760_8f8f06-89 > .kt-inside-inner-col > .aligncenter{width:100%;}.kt-row-column-wrap > .kadence-column3760_8f8f06-89{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3760_8f8f06-89{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3760_8f8f06-89 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column3760_8f8f06-89 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column3760_8f8f06-89{text-align:center;}.kadence-column3760_8f8f06-89{position:relative;}.kadence-column3760_8f8f06-89, .kt-inside-inner-col > .kadence-column3760_8f8f06-89:not(.specificity){margin-bottom:0px;}@media all and (max-width: 1024px){.kt-row-column-wrap > .kadence-column3760_8f8f06-89{align-self:flex-start;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3760_8f8f06-89{align-self:auto;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3760_8f8f06-89 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 1024px){.kadence-column3760_8f8f06-89 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 767px){.kt-row-column-wrap > .kadence-column3760_8f8f06-89{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3760_8f8f06-89{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3760_8f8f06-89 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column3760_8f8f06-89 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column3760_8f8f06-89 kb-section-dir-vertical inner-column-2\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading3760_0d666c-b7, .wp-block-kadence-advancedheading.kt-adv-heading3760_0d666c-b7[data-kb-block=\"kb-adv-heading3760_0d666c-b7\"]{padding-bottom:var(--global-kb-spacing-sm, 1.5rem);font-size:var(--global-kb-font-size-md, 1.25rem);font-weight:400;font-style:normal;text-transform:uppercase;}.wp-block-kadence-advancedheading.kt-adv-heading3760_0d666c-b7 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading3760_0d666c-b7[data-kb-block=\"kb-adv-heading3760_0d666c-b7\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading3760_0d666c-b7 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading3760_0d666c-b7[data-kb-block=\"kb-adv-heading3760_0d666c-b7\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h6 class=\"kt-adv-heading3760_0d666c-b7 wp-block-kadence-advancedheading has-theme-palette-4-color has-text-color\" data-kb-block=\"kb-adv-heading3760_0d666c-b7\">rESOURCES<\/h6>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading3760_f32bc6-b3, .wp-block-kadence-advancedheading.kt-adv-heading3760_f32bc6-b3[data-kb-block=\"kb-adv-heading3760_f32bc6-b3\"]{padding-top:0px;padding-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-top:0px;margin-bottom:0px;font-size:var(--global-kb-font-size-xxl, 4rem);line-height:1;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading3760_f32bc6-b3 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading3760_f32bc6-b3[data-kb-block=\"kb-adv-heading3760_f32bc6-b3\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading3760_f32bc6-b3 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading3760_f32bc6-b3[data-kb-block=\"kb-adv-heading3760_f32bc6-b3\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h1 class=\"kt-adv-heading3760_f32bc6-b3 wp-block-kadence-advancedheading has-theme-palette-3-color has-text-color\" data-kb-block=\"kb-adv-heading3760_f32bc6-b3\">resources for Everyone<\/h1>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading3760_70dec3-a7, .wp-block-kadence-advancedheading.kt-adv-heading3760_70dec3-a7[data-kb-block=\"kb-adv-heading3760_70dec3-a7\"]{max-width:896px;margin-right:auto;margin-left:auto;padding-top:0px;padding-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-top:0px;margin-bottom:0px;text-align:center;font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading3760_70dec3-a7 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading3760_70dec3-a7[data-kb-block=\"kb-adv-heading3760_70dec3-a7\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading3760_70dec3-a7 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading3760_70dec3-a7[data-kb-block=\"kb-adv-heading3760_70dec3-a7\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading3760_70dec3-a7 wp-block-kadence-advancedheading has-theme-palette-4-color has-text-color\" data-kb-block=\"kb-adv-heading3760_70dec3-a7\">The KnowledgeFlow Cybersafety Foundation provides a wealth of resources such as newsletters, blog posts, tip sheets and more, tailored for a wide range of audiences. Our resources cover various aspects of online safety, ensuring that each group can navigate the digital environment with confidence. Parents can access guidance to protect their children online, teachers can find tools to educate students about cybersafety, seniors can learn to avoid common online scams, and police can utilize resources to enhance their cybersecurity knowledge. By offering specialized content for these diverse groups, KnowledgeFlow empowers everyone to stay safe and secure in the digital world.<\/p>\n\n\n<style>.wp-block-kadence-advancedbtn.kt-btns3760_20755c-3d, .site .entry-content .wp-block-kadence-advancedbtn.kt-btns3760_20755c-3d, .wp-block-kadence-advancedbtn.kb-btns3760_20755c-3d, .site .entry-content .wp-block-kadence-advancedbtn.kb-btns3760_20755c-3d{margin-bottom:0px;}.wp-block-kadence-advancedbtn.kb-btns3760_20755c-3d{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:center;align-items:center;}.kt-btns3760_20755c-3d .kt-button{font-weight:normal;font-style:normal;}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns3760_20755c-3d\"><style>ul.menu .wp-block-kadence-advancedbtn .kb-btn3760_ca1dfd-32.kb-button{width:initial;}.wp-block-kadence-advancedbtn .kb-btn3760_ca1dfd-32.kb-button{margin-top:var(--global-kb-spacing-sm, 1.5rem);}.wp-block-kadence-advancedbtn .kb-btn3760_ca1dfd-32.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn3760_ca1dfd-32.kb-button:focus{background:var(--global-palette1, #3182CE);}<\/style><a class=\"kb-button kt-button button kb-btn3760_ca1dfd-32 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-inherit  kt-btn-has-text-true kt-btn-has-svg-false  wp-block-button__link wp-block-kadence-singlebtn\" href=\"https:\/\/knowledgeflow.org\/resources\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"kt-btn-inner-text\">View Resources<\/span><\/a><\/div>\n<\/div><\/div>\n\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Eche un vistazo a nuestro nuevo bolet\u00edn repleto de titulares seleccionados cuidadosamente por los expertos en ciberseguridad de KnowledgeFlow. Vol. 5. Top Story...<\/p>","protected":false},"author":8,"featured_media":3779,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[516],"tags":[],"class_list":["post-3760","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebytes"],"acf":[],"taxonomy_info":{"category":[{"value":516,"label":"KnowledgeBytes"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-KnowledgeFlow-Newsletter-\u2013-5th-Ed.-1.png",1024,576,false],"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/es\/author\/knowledgefloweditor\/"},"comment_info":0,"category_info":[{"term_id":516,"name":"KnowledgeBytes","slug":"knowledgebytes","term_group":0,"term_taxonomy_id":516,"taxonomy":"category","description":"","parent":0,"count":78,"filter":"raw","cat_ID":516,"category_count":78,"category_description":"","cat_name":"KnowledgeBytes","category_nicename":"knowledgebytes","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/posts\/3760","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/comments?post=3760"}],"version-history":[{"count":0,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/posts\/3760\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/media\/3779"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/media?parent=3760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/categories?post=3760"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/tags?post=3760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}